Sökning: "Stealthy Attacks"

Visar resultat 1 - 5 av 9 avhandlingar innehållade orden Stealthy Attacks.

  1. 1. Stealthy Sensor Attacks on Feedback Systems : Attack Analysis and Detector-based Defense Mechanisms

    Författare :David Umsonst; Henrik Sandberg; Hideaki Ishii; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Electrical Engineering; Elektro- och systemteknik;

    Sammanfattning : In this thesis, we investigate sensor attacks on feedback systems and how anomaly detectors can be used as a defense mechanism. We consider an attacker with access to all sensor measurements and full knowledge about the closed-loop system model. LÄS MER

  2. 2. Departure-Based Intrusion Detection

    Författare :Wissam Aoudi; Chalmers tekniska högskola; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Singular Spectrum Analysis; Industrial Control Systems; Intrusion Detection; Departure Detection; Stealthy Attacks; PASAD;

    Sammanfattning : Industrial Control Systems (ICS) combine information technology with operation technology to monitor or control physical industrial processes via computer-based programs and often operate on critical infrastructures. As such, compromised or maliciously operated ICS can cause devastating consequences on society at large. LÄS MER

  3. 3. Understanding the Capabilities of Route Collectors to Observe Stealthy Hijacks : Does adding more monitors or reporting more paths help?

    Författare :Alexandros Milolidakis; Dejan Manojlo Kostic; Marco Chiesa; Alberto Dainotti; KTH; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Border gateway protocol; Stealthy hijacking; BGP hijacking; Route collector; Informations- och kommunikationsteknik; Information and Communication Technology;

    Sammanfattning : Routing hijacks have plagued the Internet for decades. These attacks corrupt the routing table entries that networks use to forward traffic, causing affected network devices to route private and possibly sensitive Internet traffic towards the hijacker. LÄS MER

  4. 4. Analysis, Detection, and Mitigation of Attacks in Cyber-physical Systems

    Författare :Hanxiao Liu; Lihua Xie; Karl H. Johansson; Daniel Quevedo; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Security of cyber-physical systems; detection of cyber-attacks; POMDP; rollout approach; Electrical Engineering; Elektro- och systemteknik;

    Sammanfattning : Cyber-Physical Systems (CPS) offer close integration among computational elements, communication networks, and physical processes. Such systems play an increasingly important role in a large variety of fields, such as manufacturing, health care, environment, transportation, defence, and so on. LÄS MER

  5. 5. Analysis of Attacks on Controlled Stochastic Systems

    Författare :Alessio Russo; Alexandre Proutiere; György Dán; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; reinforcement learning; markov decision process; attack; detection; data poisoning; online learning; Datalogi; Computer Science; Electrical Engineering; Elektro- och systemteknik;

    Sammanfattning : In this thesis, we investigate attack vectors against Markov decision processes anddynamical systems. This work is motivated by the recent interest in the researchcommunity towards making Machine Learning models safer to malicious attacks. LÄS MER